US20230308475A1 - Online Game Network Demultiplexer with Denial-of-Service Prevention - Google Patents

Online Game Network Demultiplexer with Denial-of-Service Prevention Download PDF

Info

Publication number
US20230308475A1
US20230308475A1 US17/704,767 US202217704767A US2023308475A1 US 20230308475 A1 US20230308475 A1 US 20230308475A1 US 202217704767 A US202217704767 A US 202217704767A US 2023308475 A1 US2023308475 A1 US 2023308475A1
Authority
US
United States
Prior art keywords
address
token
client device
private
application server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US17/704,767
Other versions
US12081585B2 (en
Inventor
Brian PANE
Ravi I. Singh
Lan Wei
David Stahl
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Roblox Corp
Original Assignee
Roblox Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Roblox Corp filed Critical Roblox Corp
Priority to US17/704,767 priority Critical patent/US12081585B2/en
Assigned to ROBLOX CORPORATION reassignment ROBLOX CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: STAHL, DAVID, PANE, Brian, SINGH, RAVI I., WEI, LAN
Priority to PCT/US2023/015793 priority patent/WO2023183318A1/en
Publication of US20230308475A1 publication Critical patent/US20230308475A1/en
Application granted granted Critical
Publication of US12081585B2 publication Critical patent/US12081585B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1023Server selection for load balancing based on a hash applied to IP addresses or costs

Definitions

  • Embodiments relate generally to an online game network demultiplexer that prevents denial-of-service attacked.
  • Some online platforms allow users to connect with each other, interact with each other (e.g., within a game), create games, and share information with each other via the Internet.
  • Users of online platforms may participate in multiplayer gaming environments or virtual environments (e.g., three-dimensional environments), design custom gaming environments, design characters and avatars, decorate avatars, exchange virtual items/objects with other users, communicate with other users using audio or text messaging, and so forth. Environments such as metaverse or multiverse environments can also enable users that participate to share, sell, or trade objects of their creation with other users.
  • IP internet protocol
  • DoS Denial of Service
  • a computer-implemented method performed at a processing server comprises: receiving a request to join an application server from a client device.
  • the method further comprises identifying a targeted application server from a set of application servers, a private internet protocol (IP) address for the targeted application server, and a port number associated with the targeted application server.
  • IP internet protocol
  • the method further comprises generating a token based at least in part on the private IP address for the targeted application server.
  • the method further comprises mapping the private IP address to a virtual IP (VIP) address.
  • VIP virtual IP
  • the token is a hash of a client device IP address of the client device, the private IP address, and a secret key, and wherein the secret key is stored at the processing server.
  • the secret key is selected from a set of secret keys that are updated periodically.
  • the method further comprises receiving, from the client device, an ingress packet at a demultiplexer that corresponds to the VIP address, wherein the ingress packet includes a routing and authentication header, parsing the routing and authentication header to obtain the private IP address, the port number, and the token, determining, using a secret key, whether the token is valid, and responsive to determining that the token is valid, forwarding the ingress packet to the targeted application server.
  • the processing server is one of a plurality of processing servers mapped to the VIP address
  • the ingress packet is received by a first processing server that is different from a second processing server that received the request to join
  • the first processing server determines that the token is valid using information from the ingress packet and the secret key.
  • determining whether the token is valid includes comparing the token to a hash of a client device IP address, the private IP address, and the secret key to confirm that both values are equal.
  • forwarding the ingress packet to the targeted application server includes using a tunnel to forward the ingress packet by generating an encapsulated packet.
  • the method further includes responsive to determining that the token is invalid, performing one or more of dropping future ingress packets from the client device or automatically blocking the client device IP address.
  • receiving the request to join and transmitting the token are over hypertext transfer protocol (HTTP) and wherein receiving the ingress packet at the VIP address occurs over UDP.
  • the demultiplexer steers the ingress packet to a specific Point of Presence (PoP) that hosts the targeted application server.
  • PoP Point of Presence
  • the token is a first token and the method further includes: generating a second token using a second secret key, wherein generating the second token is performed after at least a predetermined amount of time has passed from generating the token, where generating the second token invalidates the first token.
  • the processing server is one of a plurality of processing servers mapped to the VIP address, incoming packets are sharded among the plurality of processing servers, and each of the plurality of processing servers receives a secret key that is used for authentication of the token.
  • identifying the targeted application server from the set of application servers is based on a client device IP address of the client device and selecting the targeted application server that is closest to a location of the client device as compared to other application servers in the set of application servers.
  • the token is a hash of a client device IP address of the client device, the private IP address, and a secret key and the processing server receives a randomly selected value and generates the secret key from the randomly selected value.
  • a system may include a processor and a memory coupled to the processor, with instructions stored thereon that, when executed by the processor, cause the processor to perform operations comprising: receiving a request to join an application server from a client device; identifying a targeted application server from a set of application servers, a private internet protocol (IP) address for the targeted application server, and a port number associated with the targeted application server; generating a token based on the private IP address for the targeted application server; mapping the private IP address to a VIP address; and transmitting the VIP address, the private IP address, the port number, and the token to the client device.
  • IP internet protocol
  • Embodiments may further include a non-transitory computer readable medium that includes instructions stored thereon that, when executed by one or more computers, cause the one or more computers to perform operations comprising: receiving a request to join an application server from a client device; identifying a targeted application server from a set of application servers, a private internet protocol (IP) address for the targeted application server, and a port number associated with the targeted application server; generating a token based on the private IP address for the targeted application server; mapping the private IP address to a VIP address; and transmitting the VIP address, the private IP address, the port number, and the token to the client device.
  • IP internet protocol
  • the token is a hash of a client device IP address of the client device, the private IP address, and a secret key, and wherein the secret key is stored at the processing server.
  • the secret key is selected from a set of secret keys that are updated periodically.
  • the operations further include: receiving, from the client device, an ingress packet at a demultiplexer that corresponds to the VIP address, wherein the ingress packet includes a routing and authentication header, parsing the routing and authentication header to obtain the private IP address, the port number, and the token, determining, using a secret key, whether the token is valid, and responsive to determining that the token is valid, forwarding the ingress packet to the targeted application server.
  • the specification advantageously uses a demultiplexer that runs in front of a pool of game servers and provides access to the game servers via a single, VIP address.
  • the system is able to avoid distributed denial of service (DDoS) attacks.
  • a secret key is used as part of an authentication process, which avoids the need for encryption/decryption algorithms to run on the client device.
  • client devices with lower-processing power such as low-end tablets are able to play games that are normally reserved for client devices with more processing power.
  • the token is provided to the client device, which relays the token to the demultiplexer for authentication, the client device does not have to spend processing power on computing the token.
  • FIG. 1 is a block diagram of an example network environment, according to some embodiments described herein.
  • FIG. 2 is a block diagram of an example computing device, according to some embodiments described herein.
  • FIG. 3 is an example flow diagram between a game client and a game server, according to some embodiments described herein.
  • FIG. 4 is an example flow diagram between a client device and a processing application, according to some embodiments.
  • FIG. 5 is an example flow diagram written from the processing server perspective, according to some embodiments described therein.
  • FIG. 1 illustrates a block diagram of an example environment 100 .
  • the environment 100 includes a client device 101 , one or more processing servers 111 , a demultiplexer, application servers 115 a . . . n , and a network 105 .
  • a user 125 may be associated with the client device 101 .
  • the environment 100 may include other servers or devices not shown in FIG. 1 .
  • a letter after a reference number e.g., “ 115 a ,” represents a reference to the element having that particular reference number.
  • a reference number in the text without a following letter, e.g., “ 115 ,” represents a general reference to embodiments of the element bearing that reference number.
  • the client device 101 may be a computing device that includes a memory and a hardware processor.
  • the client device 101 may include a desktop computer, a mobile device, a tablet computer, a mobile telephone, a wearable device, a portable game player, a portable music player, a reader device, or another electronic device capable of accessing a network 105 .
  • the client device 101 includes a game application 103 a with code and routines operable to send a request to the processing server 111 to join a game.
  • the game application 103 a is described as an application, other instantiations are possible, such as a browser version.
  • the game application 103 a may receive a virtual internet protocol (VIP) address, a port number associated with an application server 115 a , and a token from the processing server 111 .
  • VIP virtual internet protocol
  • the game application 103 a generates an ingress packet.
  • the ingress packet includes a routing and authentication header with the token received from the processing server 111 .
  • the client device 101 transmits the ingress packet to the VIP address provided by the processing server 111 .
  • the game application 103 a may receive an egress packet directly from the application server 115 .
  • the ingress packet is received at the VIP address that is mapped to the demultiplexer 150 .
  • the demultiplexer 150 processes the ingress packet, authenticates a token that is part of the ingress packet, and responsive to the token being valid, forwards the information in the ingress packet to one of the application servers 115 via the network 105 .
  • the processing server 111 includes one or more servers that each include a processor, a memory, and network communication hardware.
  • the processing server 111 is a hardware server.
  • the processing server 111 is communicatively coupled to the network 105 .
  • the processing server 111 sends and receives data to and from the client device 101 and the applications servers 115 a . . . n via the network 105 .
  • the processing server 111 may include a processing application 113 and a database 199 .
  • processing application 113 includes code and routines operable to receive a request to join the application server 115 from the client device 101 .
  • the processing application 113 identifies a targeted application server 115 , such as application server 115 a , and requests a token for a private IP address with a port number associated with the targeted application server 115 a .
  • the processing application 113 maps the private IP address to a VIP address and generates a token that is based on the private IP address and the VIP address.
  • the processing application 113 transmits the VIP address, the port number, and the token to the client device 101 .
  • the processing application 113 is implemented using hardware including a central processing unit (CPU), a field-programmable gate array (FPGA), an application-specific integrated circuit (ASIC), any other type of processor, or a combination thereof. In some embodiments, the processing application 113 is implemented using a combination of hardware and software.
  • CPU central processing unit
  • FPGA field-programmable gate array
  • ASIC application-specific integrated circuit
  • the data store 199 may be a non-transitory computer readable memory (e.g., random access memory), a cache, a drive (e.g., a hard drive), a flash drive, a database system, or another type of component or device capable of storing data.
  • the data store 199 may also include multiple storage components (e.g., multiple drives or multiple databases) that may also span multiple computing devices (e.g., multiple server computers).
  • the data store 199 may store data associated with the processing application 113 , such as tokens, secret keys, pre-secret keys, private IP addresses, port numbers, VIP addresses, etc.
  • FIG. 1 illustrates one client device 101
  • the disclosure applies to a system architecture having one or more client devices 101 .
  • the entities of the environment 100 are communicatively coupled via a network 105 .
  • the network 105 may include a public network (e.g., the Internet), a private network (e.g., a local area network (LAN) or wide area network (WAN)), a wired network (e.g., Ethernet network), a wireless network (e.g., an 802.11 network, a Wi-Fi® network, or wireless LAN (WLAN)), a cellular network (e.g., a Long Term Evolution (LTE) network), routers, hubs, switches, server computers, or a combination thereof.
  • FIG. 1 illustrates one network 105 coupled to the client device 101 , the processing server 111 , and the application servers 115 , in practice one or more networks 105 may be coupled to these entities.
  • FIG. 2 is a block diagram of an example computing device 200 that may be used to implement one or more features described herein.
  • Computing device 200 can be any suitable computer system, server, or other electronic or hardware device.
  • computing device 200 is the processing server 111 .
  • computing device 200 includes a processor 235 , a memory 237 , a I/O interface 239 , and a storage device 245 .
  • the processor 235 may be coupled to a bus 218 via signal line 222
  • the memory 237 may be coupled to the bus 218 via signal line 224
  • the I/O interface 239 may be coupled to the bus 218 via signal line 226
  • the storage device 245 may be coupled to the bus 218 via signal line 228 .
  • the processor 235 includes an arithmetic logic unit, a microprocessor, a general-purpose controller, or some other processor array to perform computations and provide instructions to a display device.
  • Processor 235 processes data and may include various computing architectures including a complex instruction set computer (CISC) architecture, a reduced instruction set computer (RISC) architecture, or an architecture implementing a combination of instruction sets.
  • FIG. 2 illustrates a single processor 235 , multiple processors 235 may be included.
  • processor 235 may be a single-core processor or a multicore processor.
  • Other processors e.g., graphics processing units), operating systems, sensors, displays, and/or physical configurations may be part of the computing device 200 .
  • the processor 235 is coupled to the bus 220 for communication with the other components via signal line 222 .
  • the memory 237 stores instructions that may be executed by the processor 235 and/or data.
  • the instructions may include code and/or routines for performing the techniques described herein.
  • the memory 237 may be a dynamic random access memory (DRAM) device, a static RAM, or some other memory device.
  • the memory 237 also includes a non-volatile memory, such as a static random access memory (SRAM) device or flash memory, or similar permanent storage device and media including a hard disk drive, a compact disc read only memory (CD-ROM) device, a DVD-ROM device, a DVD-RAM device, a DVD-RW device, a flash memory device, or some other mass storage device for storing information on a more permanent basis.
  • the memory 237 includes code and routines operable to execute the video application 103 , which is described in greater detail below.
  • the memory 237 is coupled to the bus 220 for communication with the other components via signal line 224 .
  • I/O interface 239 can provide functions to enable interfacing the computing device 200 with other systems and devices. Interfaced devices can be included as part of the computing device 200 or can be separate and communicate with the computing device 200 . For example, network communication devices, storage devices (e.g., memory 237 and/or storage device 245 ), and input/output devices can communicate via I/O interface 239 . In another example, the I/O interface 239 can receive data from the client device 101 and deliver the data to the processing application 113 and components of the processing application 113 , such as the matchmaker 202 .
  • the I/O interface 239 can connect to interface devices such as input devices (keyboard, pointing device, touchscreen, microphone, camera, scanner, sensors, etc.) and/or output devices (display devices, speaker devices, printers, monitors, etc.).
  • interface devices such as input devices (keyboard, pointing device, touchscreen, microphone, camera, scanner, sensors, etc.) and/or output devices (display devices, speaker devices, printers, monitors, etc.).
  • the I/O interface 239 is coupled to the bus 220 for communication with the other components via signal line 226 .
  • the storage device 245 stores data related to the processing application 113 .
  • the storage device 245 may store tokens, secret keys, pre-secret keys, private IP addresses, port numbers, VIP addresses, etc.
  • the processing application 113 is part of the processing server 111
  • the storage device 245 is the same as the database 199 in FIG. 1 .
  • FIG. 2 illustrates a computing device 200 that executes an example processing application 113 that includes a matchmaker 202 , a token generator 204 , a demultiplexer 206 , and a user interface module 208 .
  • the modules are illustrated as being part of the same processing application 113 , persons of ordinary skill in the art will recognize that the modules may be implemented by different processing servers 111 and demultiplexers 150 in any combination.
  • a first processing server 111 a may include the matchmaker 202 and the token generator 204 and a demultiplexer 206 may be part of a standalone second processing server 111 b.
  • the matchmaker 202 identifies an application server 115 and provides information to the client device 101 .
  • the matchmaker 202 includes a set of instructions executable by the processor 235 to identify the application server 115 and provide information to the client device 101 .
  • the matchmaker 202 is stored in the memory 237 of the computing device 200 and can be accessible and executable by the processor 235 .
  • the matchmaker 202 receives a request to join an application server 115 from a client device 101 .
  • the matchmaker 202 identifies a targeted application server 115 a from a set of application servers 115 a . . . n .
  • the matchmaker 202 may assign the client device 101 to the targeted application server 115 a to balance load on various application servers 115 and/or other components, based on a network proximity between the client device 101 and various available application servers 115 , and/or other factors.
  • the matchmaker 202 may identify the targeted application server 115 a from the set of application servers based on a client device IP address of the client device 101 and select the targeted application server 115 a that is closest to a location of the client device 101 as compared to other application servers 115 in the set of application servers 115 .
  • the matchmaker 202 may determine the private IP address and the port number of the targeted application server 115 a.
  • the matchmaker 202 may assign multiple demultiplexer 206 to handle the communications with the client device 101 .
  • the matchmaker 202 may map the private IP address to a virtual IP (VIP) address for one or more demultiplexers 206 that listen to the same VIP address.
  • VIP virtual IP
  • the matchmaker 202 requests a token from the token generator 204 . This process is described in greater detail below with reference to the token generator 204 .
  • the matchmaker 202 provides the VIP address, the private IP address, the port number, and the token to the client device 101 via the I/O interface 239 .
  • the communication between the client device 101 and the matchmaker 202 occur over hypertext transfer protocol (HTTP) or secure HTTP (HTTPS).
  • HTTP hypertext transfer protocol
  • HTTPS secure HTTP
  • the token generator 204 generates a token.
  • the token generator 204 includes a set of instructions executable by the processor 235 to generate the token.
  • the token generator 204 is stored in the memory 237 of the computing device 200 and can be accessible and executable by the processor 235 .
  • the matchmaker 202 requests a token from the token generator 204 .
  • the request may include a private IP address and a port number for the targeted application server 115 a that is assigned to the client device 101 .
  • the token generator 204 may use a cryptographic hash function that is a cryptographic Message Authentication Code (MAC) where the token is derived from connection information, time (e.g., a timestamp), and platform-defined metadata.
  • MAC Message Authentication Code
  • the token serves to provide a limited amount of platform-defined metadata for token versioning and platform-defined purposes.
  • the token generator 204 generates a token by hashing an IP address of the client device 101 , the private IP address of the targeted application server 115 a , and a secret key. In other embodiments, the token generator 204 generates a token by hashing the VIP address, the IP address of the client device 101 , the private IP address of the targeted application server 115 a , and the secret key. In some embodiments, the token generator 204 uses a hash-based message authentication code (HMAC) algorithm to generate the token.
  • HMAC hash-based message authentication code
  • the secret key may be selected from a set of secret keys that are updated periodically. For example, the secret key may be updated periodically. Each secret key may be valid for a short period of time, for example, 10 seconds. The secret key is updated to a new value at the expiration of its validity period. In some embodiments, the secret key may be selected from a set of keys (e.g., 1000 keys) that are rotated. In some embodiments, a new secret key may be generated at the end of each validity period.
  • the tunable window may be modified based on different factors, such as when the token generator 204 is overloaded but not experiencing bad client devices 101 (e.g., a DoS attack) to increase a length that the secret key is valid or when the processing server 111 is experiencing a DoS attack to decrease a length that the secret key is valid.
  • bad client devices 101 e.g., a DoS attack
  • the token generator 204 may update the secret key frequently (e.g., every second, every few seconds, every millisecond, etc.) to guard against replay attacks.
  • the token generator 204 uses a two-stage generation process where the token generator 204 distributes a pre-pepper (e.g., a randomly selected value) to all demultiplexers 206 and application servers 115 , and each of the demultiplexers 206 and application servers 115 generate successive secret keys or use the pre-pepper to validate a secret key.
  • a pre-pepper e.g., a randomly selected value
  • the generation may be based on the pre-pepper using a deterministic process such that each demultiplexer 206 and/or application servers 115 generate identical secret keys from identical inputs.
  • each generation of a secret key from a pre-pepper marks a time interval for effective use of the secret key based on a timestamp.
  • each application server 115 actively requests a pre-pepper from the token generator 204 to support fast rotation of pre-peppers.
  • the token generator 204 rotates the pre-peppers based on selective parameters and administrator input.
  • the token is valid for a predetermined amount of time.
  • the token generator 204 generates a first token and after a predetermined amount of time, generates a second token.
  • the second token uses a different secret key.
  • generation of the second token invalidates the first token after another predetermined amount of time.
  • the token generator 204 transmits the following information to the matchmaker 202 , which relays the information to the client device 101 via the I/O interface 239 ; a virtual IP (VIP) address for the demultiplexer 206 , the private IP address and the port number for the targeted application server 115 a , and the token.
  • the information is transmitted directly to the client device 101 via the I/O interface 239 .
  • the demultiplexer 206 provides client devices 101 with access to the application servers 115 via the VIP address.
  • the demultiplexer 206 includes a set of instructions executable by the processor 235 to provide access to the application servers 115 .
  • the demultiplexer 206 is stored in the memory 237 of the computing device 200 and can be accessible and executable by the processor 235 .
  • the demultiplexer 206 receives the secret key from the token generator 204 .
  • the demultiplexer 206 receives ingress packets from the client device 101 .
  • Each ingress packet may include an extensible custom application-layer header, a routing and authentication header, and a message.
  • the routing and authentication header includes the private IP address and the port number for the targeted application server 115 a , as well as the token.
  • the header may be extensible to enable additional demultiplexer functionality in the future.
  • the demultiplexer 206 Upon receipt of an ingress packet, the demultiplexer 206 checks the routing and authentication header. If the ingress packet is lacking the routing and authentication header or the routing and authentication head is malformed, the demultiplexer 206 discards the ingress packet. If the routing and authentication header is present and not malformed, the demultiplexer 206 parses the routing and authentication layer to extract the private IP address and the port number for the targeted application server 115 a , as well as the token. The demultiplexer 206 performs authentication of the token. For example, the demultiplexer 206 may identify the secret key; generate a hash of the client device IP address, the private IP address, and a secret key; and compare the hash to the token to confirm that the values are equal.
  • the demultiplexer 206 may drop the ingress packet. This protects the system from a distributed DoS (DDoS) attack.
  • the demultiplexer 206 may drop future ingress packets from the same client device 101 or automatically block the client device 101 IP address. For example, the demultiplexer 206 may stream data about attributes of the ingress packets that fail token validation, resulting in the demultiplexer 206 using a list of client devices 101 that are given persistent-drop treatment. In some embodiments, the demultiplexer 206 sends a notification to the client device 101 that the ingress packet is invalid.
  • the demultiplexer 206 may identify the targeted application server 115 a using the private IP address and the port number and forward the ingress packet to the targeted application server 115 a .
  • the demultiplexer 206 encapsulates the ingress packet and forwards an egress packet to the targeted application server 115 a by using a tunnel. More specifically, the demultiplexer 206 may encapsulate the ingress packet in a tunnel header of type generic user datagram protocol (UDP) encapsulation (GUE) header.
  • the egress packet may include an extensible custom application-layer header, a GUE header, and the message.
  • receiving the ingress packet at the VIP address and transmitting the egress packet to the targeted application server 115 a occur using UDP.
  • the targeted application server 115 a communicates directly with the client device 101 without the demultiplexer 206 serving as an intermediary.
  • FIG. 3 an example use case 300 between a game client and a game server is illustrated.
  • the example use case 300 is for a game client and a game server
  • persons of ordinary skill in the art will recognize that this process could apply to any situation where a client device is trying to access one of many application servers and a demultiplexer serves as an intermediary to prevent the risk of DDoS attacks.
  • a game client 301 generates an ingress packet 305 and transmits the ingress packet 305 to the demultiplexer.
  • the ingress packet 305 may include IP+UDP headers 310 , a routing and authentication header 315 , and a game message 320 .
  • the IP+UDP headers 310 include a client IP address.
  • the routing and authentication header 315 includes a private IP address for the targeted application server 115 , a port number, and a signed token.
  • game message 320 may be a Raknet based message. While RakNet is one UDP-based application protocol that may be used, other UDP-based non-Raknet applications can also be similarly used.
  • the demultiplexer 325 receives the ingress packet 305 , parses the routing and authentication header 315 for the IP address, the port number, and the token. The demultiplexer 325 authenticates the token and, if the token is valid, generates an encapsulated packet 330 from the ingress packet 305 .
  • the encapsulated packet 330 includes IP+UDP headers 335 , a GUE header 340 , and the game message 345 .
  • the demultiplexer 325 transmits the encapsulated packet 330 to the game server 350 .
  • the game server 350 then directly communicates with the game client 301 .
  • the demultiplexer 325 is part of a processing server 111 that is one of multiple processing servers 111 mapped to the same VIP address.
  • the network 105 may shard the incoming packets among the multiple processing servers as part of a horizontally scaled setup.
  • the network 105 uses the common routing protocol Border Gateway Protocol (BGP) with Equal Cost Multi Path (ECMP) hashing (or other suitable techniques) to shard the ingress packets evenly among the processing servers 111 .
  • BGP Border Gateway Protocol
  • ECMP Equal Cost Multi Path
  • the ingress packets are divided without the need for synchronizing per-flow state between the multiple demultiplexers 206 that are part of the horizontally scaled setup.
  • each demultiplexer 325 in the multiple processing servers 111 receives the secret key and uses it to authenticate the token.
  • the processing server 111 that processed an initial request and generated the secret key is not the only processing server 111 capable of performing authentication. Any of the processing servers 111 are capable of performing authentication using the secret key and the ingress packet transmitted by the client device 101 .
  • One advantage of the demultiplexer 325 is that its stateless nature allows game traffic from client devices 101 to arrive at any of the Point of Presence (PoP) edge data centers and the game traffic will be forwarded to the correct application server 115 in whichever PoP is located in the network 105 . As a result, the VIPs can be successfully used in a global anycast fashion.
  • PoP Point of Presence
  • the use of the VIP address along with the stateless nature of the demultiplexer 206 enabled by the routing and authentication header provides another attractive property: namely the ability to steer traffic on a per-user basis to a specific ingress PoP—an edge data center that hosts application servers 115 in the global network 105 .
  • Internet routing on parts of the internet owned by other network providers, including where the client device 101 may be connected, might otherwise have caused traffic from the specific client device 101 to ingress into the network 105 at a different PoP to reach the same application server 115 .
  • this steering to specific PoPs might be done to provide a better network experience, for example, because a specific application server 115 may be selected for lower latency or lower network congestion to specific client devices 101 by various techniques including backhauling over the network 105 to the specific PoP where the application server 115 is located.
  • the use of the VIP address with the demultiplexer 206 enables global IPv4 address space conservation in that the application servers 115 do not themselves need to have a per-application server 115 global IPv4 address and can just be numbered with RFC1918 private addresses on their network interface. An entire PoP of application servers 115 could thus be abstracted behind a single per-PoP VIP address. Alternatively, there may be multiple VIP addresses in use on a horizontally-scaled demultiplexer 206 pool to enable partitioning of the traffic for network management or for capacity planning.
  • the user interface module 208 generates a user interface.
  • the user interface module 208 includes a set of instructions executable by the processor 235 to generate the user interface.
  • the user interface module 208 is stored in the memory 237 of the computing device 200 and can be accessible and executable by the processor 235 .
  • the user interface module 208 generates a user interface that an administrator can use to modify settings of the processing application 113 .
  • the user interface may include an option for configuring how often the secret key is rotated, a list of client IP addresses that are blocked because the client device 101 failed authentication a predetermined number of times, etc.
  • FIG. 4 is an example flow diagram between a client device 101 and a processing application 113 , according to some embodiments.
  • the processing application 113 includes the demultiplexer 206 , but the demultiplexer 206 may be part of a separate server than the other components of the processing application 113 , such as the configuration illustrated in FIG. 1 .
  • the method illustrated in flowchart 400 is performed by both a client device 101 and a processing application 113 stored on a processing application 113 .
  • the method 400 may begin at block 402 .
  • the processing server 113 e.g., the matchmaker 202 transmits a VIP address associated with the demultiplexer 206 , a private IP address and port number associated with a targeted application server 115 a and a token to the client device 101 , Block 402 may be followed by block 404 .
  • Block 404 the client de-vice 101 generates an ingress packet, where the ingress packet includes a routing and authentication header with the token.
  • Block 404 may be followed by block 406 .
  • Block 406 the client device 101 transmits the ingress packet to the VIP address associated with the processing server 111 .
  • Block 406 may be followed by block 408 .
  • the processing application 113 parses the routing and authentication header to identify the token.
  • Block 408 may be followed by block 410 .
  • the processing application 113 determines that the token is valid.
  • Block 410 may be followed by block 412 .
  • the processing application 113 may identify a targeted application server 115 a to receive the ingress packet based on the routing and authentication header.
  • Block 412 may be followed by block 414 .
  • the processing application 113 encapsulates the ingress packet to form an egress packet.
  • Block 414 may be followed by block 416 .
  • the processing server 111 forwards the egress packet to the targeted application server 115 a.
  • FIG. 5 is an example flow diagram written from the processing server 111 perspective, according to some embodiments described therein.
  • the method illustrated in flowchart 500 may be performed by the computing device 200 in FIG. 2 .
  • the method 500 may begin at block 502 .
  • a processing server 111 receives from a client device a request to join an application server 115 .
  • Block 502 may be followed by block 504 .
  • a target application server 115 a is identified from a set of application servers 115 , a private IP address for the targeted application server 115 , and a port number associated with the targeted application server 115 .
  • Block 504 may be followed by block 506 .
  • a token is generated based on the private IP address for the targeted application server 115 .
  • Block 506 may be followed by block 508 .
  • Block 508 the private IP address is mapped to a VIP address.
  • Block 508 may be followed by block 510 .
  • the VIP address, the private IP address, the port number, and the token are transmitted to the client device 101 .
  • blocks 502 - 510 are performed over HTTP at the application server 111 .
  • Block 510 may be followed by 512 .
  • Block 512 an ingress packet is received from the client device that includes a routing and authentication header with the token.
  • Block 512 may be followed by block 514 .
  • Block 514 the token is validated.
  • Block 514 may be followed by block 516 .
  • an egress packet is transmitted to the target application server 115 a corresponding to the private IP address.
  • blocks 512 - 516 are performed over UDP at the demultiplexer 150 .
  • blocks and/or operations described herein can be performed in a different order than shown or described, and/or performed simultaneously (partially or completely) with other blocks or operations, where appropriate. Some blocks or operations can be performed for one portion of data and later performed again, e.g., for another portion of data. Not all of the described blocks and operations need be performed in various implementations. In some implementations, blocks and operations can be performed multiple times, in a different order, and/or at different times in the methods.
  • the embodiments of the specification can also relate to a processor for performing one or more steps of the methods described above.
  • the processor may be a special-purpose processor selectively activated or reconfigured by a computer program stored in the computer.
  • a computer program may be stored in a non-transitory computer-readable storage medium, including, but not limited to, any type of disk including optical disks, ROMs, CD-ROMs, magnetic disks, RAMS, EPROMs, EEPROMs, magnetic or optical cards, flash memories including USB keys with non-volatile memory, or any type of media suitable for storing electronic instructions, each coupled to a computer system bus.
  • the specification can take the form of some entirely hardware embodiments, some entirely software embodiments or some embodiments containing both hardware and software elements.
  • the specification is implemented in software, which includes, but is not limited to, firmware, resident software, microcode, etc.
  • a computer-usable or computer-readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • a data processing system suitable for storing or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus.
  • the memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A processing application stored on a processing server receives a request to join an application server from a client device. The processing application identifies a targeted application server from a set of application servers, a private internet protocol (IP) address for the targeted application server, and a port number associated with the targeted application server. The processing application generates a token based at least in part on the private IP address for the targeted application server. The processing application maps the private IP address to a virtual IP (VIP) address. The processing application transmits the VIP address, the private IP address, the port number, and the token to the client device.

Description

    BACKGROUND
  • Embodiments relate generally to an online game network demultiplexer that prevents denial-of-service attacked.
  • Some online platforms (e.g. gaming platforms, media exchange platforms, etc.), allow users to connect with each other, interact with each other (e.g., within a game), create games, and share information with each other via the Internet. Users of online platforms may participate in multiplayer gaming environments or virtual environments (e.g., three-dimensional environments), design custom gaming environments, design characters and avatars, decorate avatars, exchange virtual items/objects with other users, communicate with other users using audio or text messaging, and so forth. Environments such as metaverse or multiverse environments can also enable users that participate to share, sell, or trade objects of their creation with other users.
  • Online multiplayer games typically depend on network communication between client devices and a central server. Game operators typically run many servers for scale, with client devices partitioned among those servers. The client-to-server communication typically uses a user datagram protocol (UDP)-based application protocol. A UDP-based application protocol results in two problems. First, giving each server a unique, public internet protocol (IP) address is an inefficient use of public IP address space, especially when IPv4 address space is such a scarce resource. Second, internet-facing servers are vulnerable to Denial of Service (DoS) attacks.
  • The background description provided herein is for the purpose of presenting the context of the disclosure. Work of the presently named inventors, to the extent it is described in this background section, as well as aspects of the description that may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present disclosure.
  • SUMMARY
  • Embodiments of this application relate to using a demultiplexer to route ingress packets to a targeted application server. According to one aspect, a computer-implemented method performed at a processing server comprises: receiving a request to join an application server from a client device. The method further comprises identifying a targeted application server from a set of application servers, a private internet protocol (IP) address for the targeted application server, and a port number associated with the targeted application server. The method further comprises generating a token based at least in part on the private IP address for the targeted application server. The method further comprises mapping the private IP address to a virtual IP (VIP) address. The method further comprises transmitting the VIP address, the private IP address, the port number, and the token to the client device.
  • In some embodiments, the token is a hash of a client device IP address of the client device, the private IP address, and a secret key, and wherein the secret key is stored at the processing server. In some embodiments, the secret key is selected from a set of secret keys that are updated periodically. In some embodiments, the method further comprises receiving, from the client device, an ingress packet at a demultiplexer that corresponds to the VIP address, wherein the ingress packet includes a routing and authentication header, parsing the routing and authentication header to obtain the private IP address, the port number, and the token, determining, using a secret key, whether the token is valid, and responsive to determining that the token is valid, forwarding the ingress packet to the targeted application server. In some embodiments, the processing server is one of a plurality of processing servers mapped to the VIP address, the ingress packet is received by a first processing server that is different from a second processing server that received the request to join, and the first processing server determines that the token is valid using information from the ingress packet and the secret key. In some embodiments, determining whether the token is valid includes comparing the token to a hash of a client device IP address, the private IP address, and the secret key to confirm that both values are equal. In some embodiments, forwarding the ingress packet to the targeted application server includes using a tunnel to forward the ingress packet by generating an encapsulated packet. In some embodiments, the method further includes responsive to determining that the token is invalid, performing one or more of dropping future ingress packets from the client device or automatically blocking the client device IP address. In some embodiments, wherein receiving the request to join and transmitting the token are over hypertext transfer protocol (HTTP) and wherein receiving the ingress packet at the VIP address occurs over UDP. In some embodiments, the demultiplexer steers the ingress packet to a specific Point of Presence (PoP) that hosts the targeted application server. In some embodiments, the token is a first token and the method further includes: generating a second token using a second secret key, wherein generating the second token is performed after at least a predetermined amount of time has passed from generating the token, where generating the second token invalidates the first token. In some embodiments, the processing server is one of a plurality of processing servers mapped to the VIP address, incoming packets are sharded among the plurality of processing servers, and each of the plurality of processing servers receives a secret key that is used for authentication of the token. In some embodiments, identifying the targeted application server from the set of application servers is based on a client device IP address of the client device and selecting the targeted application server that is closest to a location of the client device as compared to other application servers in the set of application servers. In some embodiments, the token is a hash of a client device IP address of the client device, the private IP address, and a secret key and the processing server receives a randomly selected value and generates the secret key from the randomly selected value.
  • A system may include a processor and a memory coupled to the processor, with instructions stored thereon that, when executed by the processor, cause the processor to perform operations comprising: receiving a request to join an application server from a client device; identifying a targeted application server from a set of application servers, a private internet protocol (IP) address for the targeted application server, and a port number associated with the targeted application server; generating a token based on the private IP address for the targeted application server; mapping the private IP address to a VIP address; and transmitting the VIP address, the private IP address, the port number, and the token to the client device.
  • Embodiments may further include a non-transitory computer readable medium that includes instructions stored thereon that, when executed by one or more computers, cause the one or more computers to perform operations comprising: receiving a request to join an application server from a client device; identifying a targeted application server from a set of application servers, a private internet protocol (IP) address for the targeted application server, and a port number associated with the targeted application server; generating a token based on the private IP address for the targeted application server; mapping the private IP address to a VIP address; and transmitting the VIP address, the private IP address, the port number, and the token to the client device.
  • In some embodiments, the token is a hash of a client device IP address of the client device, the private IP address, and a secret key, and wherein the secret key is stored at the processing server. In some embodiments, the secret key is selected from a set of secret keys that are updated periodically. In some embodiments, the operations further include: receiving, from the client device, an ingress packet at a demultiplexer that corresponds to the VIP address, wherein the ingress packet includes a routing and authentication header, parsing the routing and authentication header to obtain the private IP address, the port number, and the token, determining, using a secret key, whether the token is valid, and responsive to determining that the token is valid, forwarding the ingress packet to the targeted application server.
  • The specification advantageously uses a demultiplexer that runs in front of a pool of game servers and provides access to the game servers via a single, VIP address. As a result, the system is able to avoid distributed denial of service (DDoS) attacks. In addition, a secret key is used as part of an authentication process, which avoids the need for encryption/decryption algorithms to run on the client device. As a result, client devices with lower-processing power, such as low-end tablets are able to play games that are normally reserved for client devices with more processing power. In addition, because the token is provided to the client device, which relays the token to the demultiplexer for authentication, the client device does not have to spend processing power on computing the token.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of an example network environment, according to some embodiments described herein.
  • FIG. 2 is a block diagram of an example computing device, according to some embodiments described herein.
  • FIG. 3 is an example flow diagram between a game client and a game server, according to some embodiments described herein.
  • FIG. 4 is an example flow diagram between a client device and a processing application, according to some embodiments.
  • FIG. 5 is an example flow diagram written from the processing server perspective, according to some embodiments described therein.
  • DETAILED DESCRIPTION Network Environment 100
  • FIG. 1 illustrates a block diagram of an example environment 100. In some embodiments, the environment 100 includes a client device 101, one or more processing servers 111, a demultiplexer, application servers 115 a . . . n, and a network 105. A user 125 may be associated with the client device 101. In some embodiments, the environment 100 may include other servers or devices not shown in FIG. 1 . In FIG. 1 and the remaining figures, a letter after a reference number, e.g., “115 a,” represents a reference to the element having that particular reference number. A reference number in the text without a following letter, e.g., “115,” represents a general reference to embodiments of the element bearing that reference number.
  • The client device 101 may be a computing device that includes a memory and a hardware processor. For example, the client device 101 may include a desktop computer, a mobile device, a tablet computer, a mobile telephone, a wearable device, a portable game player, a portable music player, a reader device, or another electronic device capable of accessing a network 105.
  • In some embodiments, the client device 101 includes a game application 103 a with code and routines operable to send a request to the processing server 111 to join a game. Although the game application 103 a is described as an application, other instantiations are possible, such as a browser version. The game application 103 a may receive a virtual internet protocol (VIP) address, a port number associated with an application server 115 a, and a token from the processing server 111.
  • The game application 103 a generates an ingress packet. In some embodiments, the ingress packet includes a routing and authentication header with the token received from the processing server 111. The client device 101 transmits the ingress packet to the VIP address provided by the processing server 111. Once the processing server 111 authenticates the ingress packet, the game application 103 a may receive an egress packet directly from the application server 115.
  • The ingress packet is received at the VIP address that is mapped to the demultiplexer 150. The demultiplexer 150 processes the ingress packet, authenticates a token that is part of the ingress packet, and responsive to the token being valid, forwards the information in the ingress packet to one of the application servers 115 via the network 105.
  • The processing server 111 includes one or more servers that each include a processor, a memory, and network communication hardware. In some embodiments, the processing server 111 is a hardware server. The processing server 111 is communicatively coupled to the network 105. In some embodiments, the processing server 111 sends and receives data to and from the client device 101 and the applications servers 115 a . . . n via the network 105. The processing server 111 may include a processing application 113 and a database 199.
  • In some embodiments, processing application 113 includes code and routines operable to receive a request to join the application server 115 from the client device 101. The processing application 113 identifies a targeted application server 115, such as application server 115 a, and requests a token for a private IP address with a port number associated with the targeted application server 115 a. The processing application 113 maps the private IP address to a VIP address and generates a token that is based on the private IP address and the VIP address. The processing application 113 transmits the VIP address, the port number, and the token to the client device 101.
  • In some embodiments, the processing application 113 is implemented using hardware including a central processing unit (CPU), a field-programmable gate array (FPGA), an application-specific integrated circuit (ASIC), any other type of processor, or a combination thereof. In some embodiments, the processing application 113 is implemented using a combination of hardware and software.
  • The data store 199 may be a non-transitory computer readable memory (e.g., random access memory), a cache, a drive (e.g., a hard drive), a flash drive, a database system, or another type of component or device capable of storing data. The data store 199 may also include multiple storage components (e.g., multiple drives or multiple databases) that may also span multiple computing devices (e.g., multiple server computers). The data store 199 may store data associated with the processing application 113, such as tokens, secret keys, pre-secret keys, private IP addresses, port numbers, VIP addresses, etc.
  • While FIG. 1 illustrates one client device 101, the disclosure applies to a system architecture having one or more client devices 101.
  • In the illustrated embodiment, the entities of the environment 100 are communicatively coupled via a network 105. The network 105 may include a public network (e.g., the Internet), a private network (e.g., a local area network (LAN) or wide area network (WAN)), a wired network (e.g., Ethernet network), a wireless network (e.g., an 802.11 network, a Wi-Fi® network, or wireless LAN (WLAN)), a cellular network (e.g., a Long Term Evolution (LTE) network), routers, hubs, switches, server computers, or a combination thereof. Although FIG. 1 illustrates one network 105 coupled to the client device 101, the processing server 111, and the application servers 115, in practice one or more networks 105 may be coupled to these entities.
  • Computing Device Example 200
  • FIG. 2 is a block diagram of an example computing device 200 that may be used to implement one or more features described herein. Computing device 200 can be any suitable computer system, server, or other electronic or hardware device. In some embodiments, computing device 200 is the processing server 111.
  • In some embodiments, computing device 200 includes a processor 235, a memory 237, a I/O interface 239, and a storage device 245. The processor 235 may be coupled to a bus 218 via signal line 222, the memory 237 may be coupled to the bus 218 via signal line 224, the I/O interface 239 may be coupled to the bus 218 via signal line 226, and the storage device 245 may be coupled to the bus 218 via signal line 228.
  • The processor 235 includes an arithmetic logic unit, a microprocessor, a general-purpose controller, or some other processor array to perform computations and provide instructions to a display device. Processor 235 processes data and may include various computing architectures including a complex instruction set computer (CISC) architecture, a reduced instruction set computer (RISC) architecture, or an architecture implementing a combination of instruction sets. Although FIG. 2 illustrates a single processor 235, multiple processors 235 may be included. In different embodiments, processor 235 may be a single-core processor or a multicore processor. Other processors (e.g., graphics processing units), operating systems, sensors, displays, and/or physical configurations may be part of the computing device 200. The processor 235 is coupled to the bus 220 for communication with the other components via signal line 222.
  • The memory 237 stores instructions that may be executed by the processor 235 and/or data. The instructions may include code and/or routines for performing the techniques described herein. The memory 237 may be a dynamic random access memory (DRAM) device, a static RAM, or some other memory device. In some embodiments, the memory 237 also includes a non-volatile memory, such as a static random access memory (SRAM) device or flash memory, or similar permanent storage device and media including a hard disk drive, a compact disc read only memory (CD-ROM) device, a DVD-ROM device, a DVD-RAM device, a DVD-RW device, a flash memory device, or some other mass storage device for storing information on a more permanent basis. The memory 237 includes code and routines operable to execute the video application 103, which is described in greater detail below. The memory 237 is coupled to the bus 220 for communication with the other components via signal line 224.
  • I/O interface 239 can provide functions to enable interfacing the computing device 200 with other systems and devices. Interfaced devices can be included as part of the computing device 200 or can be separate and communicate with the computing device 200. For example, network communication devices, storage devices (e.g., memory 237 and/or storage device 245), and input/output devices can communicate via I/O interface 239. In another example, the I/O interface 239 can receive data from the client device 101 and deliver the data to the processing application 113 and components of the processing application 113, such as the matchmaker 202. In some embodiments, the I/O interface 239 can connect to interface devices such as input devices (keyboard, pointing device, touchscreen, microphone, camera, scanner, sensors, etc.) and/or output devices (display devices, speaker devices, printers, monitors, etc.). The I/O interface 239 is coupled to the bus 220 for communication with the other components via signal line 226.
  • The storage device 245 stores data related to the processing application 113. For example, the storage device 245 may store tokens, secret keys, pre-secret keys, private IP addresses, port numbers, VIP addresses, etc. In embodiments where the processing application 113 is part of the processing server 111, the storage device 245 is the same as the database 199 in FIG. 1 .
  • Example Processing Application 113
  • FIG. 2 illustrates a computing device 200 that executes an example processing application 113 that includes a matchmaker 202, a token generator 204, a demultiplexer 206, and a user interface module 208. Although the modules are illustrated as being part of the same processing application 113, persons of ordinary skill in the art will recognize that the modules may be implemented by different processing servers 111 and demultiplexers 150 in any combination. For example, a first processing server 111 a may include the matchmaker 202 and the token generator 204 and a demultiplexer 206 may be part of a standalone second processing server 111 b.
  • The matchmaker 202 identifies an application server 115 and provides information to the client device 101. In some embodiments, the matchmaker 202 includes a set of instructions executable by the processor 235 to identify the application server 115 and provide information to the client device 101. In some embodiments, the matchmaker 202 is stored in the memory 237 of the computing device 200 and can be accessible and executable by the processor 235.
  • In some embodiments, the matchmaker 202 receives a request to join an application server 115 from a client device 101. The matchmaker 202 identifies a targeted application server 115 a from a set of application servers 115 a . . . n. For example, the matchmaker 202 may assign the client device 101 to the targeted application server 115 a to balance load on various application servers 115 and/or other components, based on a network proximity between the client device 101 and various available application servers 115, and/or other factors. For example, the matchmaker 202 may identify the targeted application server 115 a from the set of application servers based on a client device IP address of the client device 101 and select the targeted application server 115 a that is closest to a location of the client device 101 as compared to other application servers 115 in the set of application servers 115. The matchmaker 202 may determine the private IP address and the port number of the targeted application server 115 a.
  • The matchmaker 202 may assign multiple demultiplexer 206 to handle the communications with the client device 101. For example, the matchmaker 202 may map the private IP address to a virtual IP (VIP) address for one or more demultiplexers 206 that listen to the same VIP address.
  • In some embodiments, the matchmaker 202 requests a token from the token generator 204. This process is described in greater detail below with reference to the token generator 204. In some embodiments, the matchmaker 202 provides the VIP address, the private IP address, the port number, and the token to the client device 101 via the I/O interface 239.
  • In some embodiments, the communication between the client device 101 and the matchmaker 202 occur over hypertext transfer protocol (HTTP) or secure HTTP (HTTPS).
  • The token generator 204 generates a token. In some embodiments, the token generator 204 includes a set of instructions executable by the processor 235 to generate the token. In some embodiments, the token generator 204 is stored in the memory 237 of the computing device 200 and can be accessible and executable by the processor 235.
  • In some embodiments, the matchmaker 202 requests a token from the token generator 204. The request may include a private IP address and a port number for the targeted application server 115 a that is assigned to the client device 101. The token generator 204 may use a cryptographic hash function that is a cryptographic Message Authentication Code (MAC) where the token is derived from connection information, time (e.g., a timestamp), and platform-defined metadata. The token serves to provide a limited amount of platform-defined metadata for token versioning and platform-defined purposes.
  • In some embodiments, the token generator 204 generates a token by hashing an IP address of the client device 101, the private IP address of the targeted application server 115 a, and a secret key. In other embodiments, the token generator 204 generates a token by hashing the VIP address, the IP address of the client device 101, the private IP address of the targeted application server 115 a, and the secret key. In some embodiments, the token generator 204 uses a hash-based message authentication code (HMAC) algorithm to generate the token.
  • The secret key may be selected from a set of secret keys that are updated periodically. For example, the secret key may be updated periodically. Each secret key may be valid for a short period of time, for example, 10 seconds. The secret key is updated to a new value at the expiration of its validity period. In some embodiments, the secret key may be selected from a set of keys (e.g., 1000 keys) that are rotated. In some embodiments, a new secret key may be generated at the end of each validity period. In some embodiments, the tunable window may be modified based on different factors, such as when the token generator 204 is overloaded but not experiencing bad client devices 101 (e.g., a DoS attack) to increase a length that the secret key is valid or when the processing server 111 is experiencing a DoS attack to decrease a length that the secret key is valid.
  • The token generator 204 may update the secret key frequently (e.g., every second, every few seconds, every millisecond, etc.) to guard against replay attacks. In some embodiments, because a large number of processing servers 111 receive updates to the secret key values, the token generator 204 uses a two-stage generation process where the token generator 204 distributes a pre-pepper (e.g., a randomly selected value) to all demultiplexers 206 and application servers 115, and each of the demultiplexers 206 and application servers 115 generate successive secret keys or use the pre-pepper to validate a secret key. In embodiments where the demultiplexers 206 and/or the applications servers 115 generate the successive secret keys, the generation may be based on the pre-pepper using a deterministic process such that each demultiplexer 206 and/or application servers 115 generate identical secret keys from identical inputs.
  • In some embodiments, each generation of a secret key from a pre-pepper marks a time interval for effective use of the secret key based on a timestamp. In some embodiments, each application server 115 actively requests a pre-pepper from the token generator 204 to support fast rotation of pre-peppers. In some embodiments, the token generator 204 rotates the pre-peppers based on selective parameters and administrator input. By using a token generator 204 as a central node to distribute pre-peppers, the technology advantageously ensures that the secret key is hidden from other components of the network environment 100.
  • In some embodiments, the token is valid for a predetermined amount of time. For example, the token generator 204 generates a first token and after a predetermined amount of time, generates a second token. The second token uses a different secret key. In some embodiments, generation of the second token invalidates the first token after another predetermined amount of time.
  • In some embodiments, the token generator 204 transmits the following information to the matchmaker 202, which relays the information to the client device 101 via the I/O interface 239; a virtual IP (VIP) address for the demultiplexer 206, the private IP address and the port number for the targeted application server 115 a, and the token. In other embodiments, the information is transmitted directly to the client device 101 via the I/O interface 239.
  • The demultiplexer 206 provides client devices 101 with access to the application servers 115 via the VIP address. In some embodiments, the demultiplexer 206 includes a set of instructions executable by the processor 235 to provide access to the application servers 115. In some embodiments, the demultiplexer 206 is stored in the memory 237 of the computing device 200 and can be accessible and executable by the processor 235.
  • The demultiplexer 206 receives the secret key from the token generator 204. In some embodiments, the demultiplexer 206 receives ingress packets from the client device 101. Each ingress packet may include an extensible custom application-layer header, a routing and authentication header, and a message. The routing and authentication header includes the private IP address and the port number for the targeted application server 115 a, as well as the token. The header may be extensible to enable additional demultiplexer functionality in the future.
  • Upon receipt of an ingress packet, the demultiplexer 206 checks the routing and authentication header. If the ingress packet is lacking the routing and authentication header or the routing and authentication head is malformed, the demultiplexer 206 discards the ingress packet. If the routing and authentication header is present and not malformed, the demultiplexer 206 parses the routing and authentication layer to extract the private IP address and the port number for the targeted application server 115 a, as well as the token. The demultiplexer 206 performs authentication of the token. For example, the demultiplexer 206 may identify the secret key; generate a hash of the client device IP address, the private IP address, and a secret key; and compare the hash to the token to confirm that the values are equal.
  • If the demultiplexer 206 determines that the token is invalid, the demultiplexer 206 may drop the ingress packet. This protects the system from a distributed DoS (DDoS) attack. In some embodiments, the demultiplexer 206 may drop future ingress packets from the same client device 101 or automatically block the client device 101 IP address. For example, the demultiplexer 206 may stream data about attributes of the ingress packets that fail token validation, resulting in the demultiplexer 206 using a list of client devices 101 that are given persistent-drop treatment. In some embodiments, the demultiplexer 206 sends a notification to the client device 101 that the ingress packet is invalid.
  • If the demultiplexer 206 determines that the token is valid, the demultiplexer 206 may identify the targeted application server 115 a using the private IP address and the port number and forward the ingress packet to the targeted application server 115 a. In some embodiments, the demultiplexer 206 encapsulates the ingress packet and forwards an egress packet to the targeted application server 115 a by using a tunnel. More specifically, the demultiplexer 206 may encapsulate the ingress packet in a tunnel header of type generic user datagram protocol (UDP) encapsulation (GUE) header. The egress packet may include an extensible custom application-layer header, a GUE header, and the message. In some embodiments, receiving the ingress packet at the VIP address and transmitting the egress packet to the targeted application server 115 a occur using UDP.
  • In some embodiments, once the targeted application server 115 a receives the egress packet, the targeted application server 115 a communicates directly with the client device 101 without the demultiplexer 206 serving as an intermediary.
  • Turning to FIG. 3 , an example use case 300 between a game client and a game server is illustrated. Although the example use case 300 is for a game client and a game server, persons of ordinary skill in the art will recognize that this process could apply to any situation where a client device is trying to access one of many application servers and a demultiplexer serves as an intermediary to prevent the risk of DDoS attacks.
  • In this example, a game client 301 generates an ingress packet 305 and transmits the ingress packet 305 to the demultiplexer. The ingress packet 305 may include IP+UDP headers 310, a routing and authentication header 315, and a game message 320. The IP+UDP headers 310 include a client IP address. The routing and authentication header 315 includes a private IP address for the targeted application server 115, a port number, and a signed token. In some implementations, game message 320 may be a Raknet based message. While RakNet is one UDP-based application protocol that may be used, other UDP-based non-Raknet applications can also be similarly used.
  • The demultiplexer 325 receives the ingress packet 305, parses the routing and authentication header 315 for the IP address, the port number, and the token. The demultiplexer 325 authenticates the token and, if the token is valid, generates an encapsulated packet 330 from the ingress packet 305. The encapsulated packet 330 includes IP+UDP headers 335, a GUE header 340, and the game message 345. The demultiplexer 325 transmits the encapsulated packet 330 to the game server 350. The game server 350 then directly communicates with the game client 301.
  • In some embodiments, the demultiplexer 325 is part of a processing server 111 that is one of multiple processing servers 111 mapped to the same VIP address. The network 105 may shard the incoming packets among the multiple processing servers as part of a horizontally scaled setup. In some embodiments, the network 105 uses the common routing protocol Border Gateway Protocol (BGP) with Equal Cost Multi Path (ECMP) hashing (or other suitable techniques) to shard the ingress packets evenly among the processing servers 111. The ingress packets are divided without the need for synchronizing per-flow state between the multiple demultiplexers 206 that are part of the horizontally scaled setup.
  • In some embodiments, each demultiplexer 325 in the multiple processing servers 111 receives the secret key and uses it to authenticate the token. As a result, the processing server 111 that processed an initial request and generated the secret key is not the only processing server 111 capable of performing authentication. Any of the processing servers 111 are capable of performing authentication using the secret key and the ingress packet transmitted by the client device 101.
  • One advantage of the demultiplexer 325 is that its stateless nature allows game traffic from client devices 101 to arrive at any of the Point of Presence (PoP) edge data centers and the game traffic will be forwarded to the correct application server 115 in whichever PoP is located in the network 105. As a result, the VIPs can be successfully used in a global anycast fashion.
  • The use of the VIP address along with the stateless nature of the demultiplexer 206 enabled by the routing and authentication header provides another attractive property: namely the ability to steer traffic on a per-user basis to a specific ingress PoP—an edge data center that hosts application servers 115 in the global network 105. Internet routing on parts of the internet owned by other network providers, including where the client device 101 may be connected, might otherwise have caused traffic from the specific client device 101 to ingress into the network 105 at a different PoP to reach the same application server 115. Instead, this steering to specific PoPs might be done to provide a better network experience, for example, because a specific application server 115 may be selected for lower latency or lower network congestion to specific client devices 101 by various techniques including backhauling over the network 105 to the specific PoP where the application server 115 is located.
  • The use of the VIP address with the demultiplexer 206 enables global IPv4 address space conservation in that the application servers 115 do not themselves need to have a per-application server 115 global IPv4 address and can just be numbered with RFC1918 private addresses on their network interface. An entire PoP of application servers 115 could thus be abstracted behind a single per-PoP VIP address. Alternatively, there may be multiple VIP addresses in use on a horizontally-scaled demultiplexer 206 pool to enable partitioning of the traffic for network management or for capacity planning.
  • The user interface module 208 generates a user interface. In some embodiments, the user interface module 208 includes a set of instructions executable by the processor 235 to generate the user interface. In some embodiments, the user interface module 208 is stored in the memory 237 of the computing device 200 and can be accessible and executable by the processor 235.
  • In some embodiments, the user interface module 208 generates a user interface that an administrator can use to modify settings of the processing application 113. For example, the user interface may include an option for configuring how often the secret key is rotated, a list of client IP addresses that are blocked because the client device 101 failed authentication a predetermined number of times, etc.
  • Example Methods
  • FIG. 4 is an example flow diagram between a client device 101 and a processing application 113, according to some embodiments. In this embodiment, the processing application 113 includes the demultiplexer 206, but the demultiplexer 206 may be part of a separate server than the other components of the processing application 113, such as the configuration illustrated in FIG. 1 . The method illustrated in flowchart 400 is performed by both a client device 101 and a processing application 113 stored on a processing application 113.
  • The method 400 may begin at block 402. At block 402, the processing server 113 (e.g., the matchmaker 202) transmits a VIP address associated with the demultiplexer 206, a private IP address and port number associated with a targeted application server 115 a and a token to the client device 101, Block 402 may be followed by block 404.
  • At block 404, the client de-vice 101 generates an ingress packet, where the ingress packet includes a routing and authentication header with the token. Block 404 may be followed by block 406.
  • At block 406 the client device 101 transmits the ingress packet to the VIP address associated with the processing server 111. Block 406 may be followed by block 408.
  • At block 408, the processing application 113 (e.g., the demultiplexer 206) parses the routing and authentication header to identify the token. Block 408 may be followed by block 410. At block 410, the processing application 113 determines that the token is valid. Block 410 may be followed by block 412. At block 412, the processing application 113 may identify a targeted application server 115 a to receive the ingress packet based on the routing and authentication header. Block 412 may be followed by block 414. At block 414, the processing application 113 encapsulates the ingress packet to form an egress packet. Block 414 may be followed by block 416. At block 416, the processing server 111 forwards the egress packet to the targeted application server 115 a.
  • FIG. 5 is an example flow diagram written from the processing server 111 perspective, according to some embodiments described therein. The method illustrated in flowchart 500 may be performed by the computing device 200 in FIG. 2 .
  • The method 500 may begin at block 502. At block 502, a processing server 111 receives from a client device a request to join an application server 115. Block 502 may be followed by block 504.
  • At block 504, a target application server 115 a is identified from a set of application servers 115, a private IP address for the targeted application server 115, and a port number associated with the targeted application server 115. Block 504 may be followed by block 506.
  • At block 506, a token is generated based on the private IP address for the targeted application server 115. Block 506 may be followed by block 508.
  • At block 508, the private IP address is mapped to a VIP address. Block 508 may be followed by block 510.
  • At block 510, the VIP address, the private IP address, the port number, and the token are transmitted to the client device 101. In some embodiments, blocks 502-510 are performed over HTTP at the application server 111. Block 510 may be followed by 512.
  • At block 512, an ingress packet is received from the client device that includes a routing and authentication header with the token, Block 512 may be followed by block 514.
  • At block 514, the token is validated. Block 514 may be followed by block 516.
  • At block 516, responsive to the token being valid, an egress packet is transmitted to the target application server 115 a corresponding to the private IP address. In some embodiments, blocks 512-516 are performed over UDP at the demultiplexer 150.
  • The methods, blocks, and/or operations described herein can be performed in a different order than shown or described, and/or performed simultaneously (partially or completely) with other blocks or operations, where appropriate. Some blocks or operations can be performed for one portion of data and later performed again, e.g., for another portion of data. Not all of the described blocks and operations need be performed in various implementations. In some implementations, blocks and operations can be performed multiple times, in a different order, and/or at different times in the methods.
  • In the above description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the specification. It will be apparent, however, to one skilled in the art that the disclosure can be practiced without these specific details. In some instances, structures and devices are shown in block diagram form in order to avoid obscuring the description. For example, the embodiments can be described above primarily with reference to user interfaces and particular hardware. However, the embodiments can apply to any type of computing device that can receive data and commands, and any peripheral devices providing services.
  • Reference in the specification to “some embodiments” or “some instances” means that a particular feature, structure, or characteristic described in connection with the embodiments or instances can be included in at least one implementation of the description. The appearances of the phrase “in some embodiments” in various places in the specification are not necessarily all referring to the same embodiments.
  • Some portions of the detailed descriptions above are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic data capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these data as bits, values, elements, symbols, characters, terms, numbers, or the like.
  • It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms including “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission, or display devices.
  • The embodiments of the specification can also relate to a processor for performing one or more steps of the methods described above. The processor may be a special-purpose processor selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a non-transitory computer-readable storage medium, including, but not limited to, any type of disk including optical disks, ROMs, CD-ROMs, magnetic disks, RAMS, EPROMs, EEPROMs, magnetic or optical cards, flash memories including USB keys with non-volatile memory, or any type of media suitable for storing electronic instructions, each coupled to a computer system bus.
  • The specification can take the form of some entirely hardware embodiments, some entirely software embodiments or some embodiments containing both hardware and software elements. In some embodiments, the specification is implemented in software, which includes, but is not limited to, firmware, resident software, microcode, etc.
  • Furthermore, the description can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer-readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • A data processing system suitable for storing or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.

Claims (20)

What is claimed is:
1. A computer-implemented method performed at a processing server, the method comprising:
receiving a request to join an application server from a client device;
identifying a targeted application server from a set of application servers, a private internet protocol (IP) address for the targeted application server, and a port number associated with the targeted application server;
generating a token based at least in part on the private IP address for the targeted application server;
mapping the private IP address to a virtual IP (VIP) address; and
transmitting, the VIP address, the private IP address, the port number, and the token to the client device.
2. The method of claim 1, wherein the token is a hash of a client device IP address of the client device, the private IP address, and a secret key, and wherein the secret key is stored at the processing server.
3. The method of claim 2, wherein the secret key is selected from a set of secret keys that are updated periodically.
4. The method of claim 1, further comprising:
receiving, from the client device, an ingress packet at a demultiplexer that corresponds to the VIP address, wherein the ingress packet includes a routing and authentication header;
parsing the routing and authentication header to obtain the private IP address, the port number, and the token;
determining, using a secret key, whether the token is valid; and
responsive to determining that the token is valid, forwarding the ingress packet to the targeted application server.
5. The method of claim 4, wherein:
the processing server is one of a plurality of processing servers mapped to the VIP address;
the ingress packet is received by a first processing server that is different from a second processing server that received the request to join; and
the first processing server determines that the token is valid using information from the ingress packet and the secret key.
6. The method of claim 4, wherein determining whether the token is valid includes comparing the token to a hash of a client device IP address, the private IP address, and the secret key to confirm that both values are equal.
7. The method of claim 4, wherein forwarding the ingress packet to the targeted application server includes using a tunnel to forward the ingress packet by generating an encapsulated packet.
8. The method of claim 4, further comprising:
responsive to determining that the token is invalid, performing one or more of dropping future ingress packets from the client device or automatically blocking the client device IP address.
9. The method of claim 4, wherein receiving the request to join and transmitting the token are over hypertext transfer protocol (HTTP) and wherein receiving the ingress packet at the VIP address occurs over user datagram protocol (UDP).
10. The method of claim 4, wherein the demultiplexer steers the ingress packet to a specific Point of Presence (PoP) that hosts the targeted application server.
11. The method of claim 1, wherein the token is a first token and further comprising:
generating a second token using a second secret key, wherein generating the second token is performed after at least a predetermined amount of time has passed from generating the token;
wherein generating the second token invalidates the first token.
12. The method of claim 1, wherein:
the processing server is one of a plurality of processing servers mapped to the VIP address;
incoming packets are sharded among the plurality of processing servers; and
each of the plurality of processing servers receives a secret key that is used for authentication of the token.
13. The method of claim 1, wherein identifying the targeted application server from the set of application servers is based on a client device IP address of the client device and selecting the targeted application server that is closest to a location of the client device as compared to other application servers in the set of application servers.
14. The method of claim 1, wherein:
the token is a hash of a client device IP address of the client device, the private IP address, and a secret key; and
the processing server receives a randomly selected value and generates the secret key from the randomly selected value.
15. A device comprising:
a processor; and
a memory coupled to the processor, with instructions stored thereon that, when executed by the processor, cause the processor to perform operations comprising:
receiving a request to join an application server from a client device;
identifying a targeted application server from a set of application servers, a private internet protocol (IP) address for the targeted application server, and a port number associated with the targeted application server;
generating a token based at least in part on the private IP address for the targeted application server;
mapping the private IP address to a virtual IP (VIP) address; and
transmitting, the VIP address, the private IP address, the port number, and the token to the client device.
16. A non-transitory computer-readable medium with instructions stored thereon that, when executed by one or more computers, cause the one or more computers to perform operations, the operations comprising:
receiving a request to join an application server from a client device;
identifying a targeted application server from a set of application servers, a private internet protocol (IP) address for the targeted application server, and a port number associated with the targeted application server;
generating a token based at least in part on the private IP address for the targeted application server;
mapping the private IP address to a virtual IP (VIP) address; and
transmitting, the VIP address, the private IP address, the port number, and the token to the client device.
17. The computer-readable medium of claim 16, wherein the token is a hash of a client device IP address of the client device, the private IP address, and a secret key, and wherein the secret key is stored at a processing server.
18. The computer-readable medium of claim 17, wherein the secret key is selected from a set of secret keys that are updated periodically.
19. The computer-readable medium of claim 16, wherein the operations further comprise:
receiving, from the client device, an ingress packet at a demultiplexer that corresponds to the VIP address, wherein the ingress packet includes a routing and authentication header;
parsing the routing and authentication header to obtain the private IP address, the port number, and the token;
determining, using a secret key, whether the token is valid; and
responsive to determining that the token is valid, forwarding the ingress packet to the targeted application server.
20. The computer-readable medium of claim 19, wherein:
the processing server is one of a plurality of processing servers mapped to the VIP address;
the ingress packet is received by a first processing server that is different from a second processing server that received the request to join; and
the first processing server determines that the token is valid using information from the ingress packet and the secret key.
US17/704,767 2022-03-25 2022-03-25 Online game network demultiplexer with denial-of-service prevention Active 2043-03-02 US12081585B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US17/704,767 US12081585B2 (en) 2022-03-25 2022-03-25 Online game network demultiplexer with denial-of-service prevention
PCT/US2023/015793 WO2023183318A1 (en) 2022-03-25 2023-03-21 Online game network demultiplexer with denial-of-service prevention

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US17/704,767 US12081585B2 (en) 2022-03-25 2022-03-25 Online game network demultiplexer with denial-of-service prevention

Publications (2)

Publication Number Publication Date
US20230308475A1 true US20230308475A1 (en) 2023-09-28
US12081585B2 US12081585B2 (en) 2024-09-03

Family

ID=88096647

Family Applications (1)

Application Number Title Priority Date Filing Date
US17/704,767 Active 2043-03-02 US12081585B2 (en) 2022-03-25 2022-03-25 Online game network demultiplexer with denial-of-service prevention

Country Status (2)

Country Link
US (1) US12081585B2 (en)
WO (1) WO2023183318A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8213393B2 (en) * 2006-08-21 2012-07-03 Citrix Systems, Inc. Methods for associating an IP address to a user via an appliance
US20130173806A1 (en) * 2011-12-31 2013-07-04 Level 3 Communications, Llc Load-balancing cluster
US8553537B2 (en) * 2007-11-09 2013-10-08 International Business Machines Corporation Session-less load balancing of client traffic across servers in a server group
US9807016B1 (en) * 2015-09-29 2017-10-31 Juniper Networks, Inc. Reducing service disruption using multiple virtual IP addresses for a service load balancer
US20220029973A1 (en) * 2020-07-22 2022-01-27 Tailscale Inc. Centralized management of private networks

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9628542B2 (en) 2012-08-24 2017-04-18 Akamai Technologies, Inc. Hybrid HTTP and UDP content delivery
US11190374B2 (en) 2017-08-28 2021-11-30 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11483143B2 (en) 2019-04-15 2022-10-25 Smart Security Systems, Llc Enhanced monitoring and protection of enterprise data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8213393B2 (en) * 2006-08-21 2012-07-03 Citrix Systems, Inc. Methods for associating an IP address to a user via an appliance
US8553537B2 (en) * 2007-11-09 2013-10-08 International Business Machines Corporation Session-less load balancing of client traffic across servers in a server group
US20130173806A1 (en) * 2011-12-31 2013-07-04 Level 3 Communications, Llc Load-balancing cluster
US9807016B1 (en) * 2015-09-29 2017-10-31 Juniper Networks, Inc. Reducing service disruption using multiple virtual IP addresses for a service load balancer
US20220029973A1 (en) * 2020-07-22 2022-01-27 Tailscale Inc. Centralized management of private networks

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Olteanu, Vladimir, et al. "Stateless datacenter load-balancing with beamer." 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). (Year: 2018) *
Pei, Chao, et al. English translation of CN_103491053_A_I. (Year: 2014) *

Also Published As

Publication number Publication date
WO2023183318A1 (en) 2023-09-28
US12081585B2 (en) 2024-09-03

Similar Documents

Publication Publication Date Title
US10498708B2 (en) Scaling IPSEC processing on a virtual machine
US9900182B2 (en) Client side redirection with pluggable authentication and authorization
US10701107B2 (en) Deterministic load balancing of IPSec processing
US10834054B2 (en) Systems and methods for API routing and security
US9871794B2 (en) Domain name system and method of operating using restricted channels
US11115391B2 (en) Securing end-to-end virtual machine traffic
EP3622699B1 (en) Methods of bidirectional packet exchange over nodal pathways
US9979711B2 (en) Authentication for VLAN tunnel endpoint (VTEP)
US20170063927A1 (en) User-Aware Datacenter Security Policies
US10630636B1 (en) Anti-censorship framework using moving target defense systems and methods
US9619662B1 (en) Virtual network pairs
US20240039891A1 (en) Packet watermark with static salt and token validation
Raza et al. vepc-sec: Securing lte network functions virtualization on public cloud
CN112217833A (en) Secure socket protocol unloading method and device, storage medium and electronic equipment
US11606359B1 (en) Cloud service authentication microservice
US20240080314A1 (en) Packet watermark with dynamic token validation
US12081585B2 (en) Online game network demultiplexer with denial-of-service prevention
WO2020191095A1 (en) Network route optimization using excess private network capacity
Oncioiu et al. Approach to prevent SYN flood DoS Attacks in Cloud
US20240333758A1 (en) Systems and methods for mitigating ddos attacks on internet protocol networks
US20240106799A1 (en) Profile-based routing and access control for management interface of virtual network services
Tanceska et al. Simulation Analysis of DoS, MITM and CDP Security Attacks and Countermeasures
CN116418661A (en) Information transmission method, apparatus, electronic device, software program, and storage medium
Hardy et al. Understanding DoS protection services
Vu Defending against distributed denial of service attacks using a cloud based architecture

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: ROBLOX CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PANE, BRIAN;SINGH, RAVI I.;WEI, LAN;AND OTHERS;SIGNING DATES FROM 20220321 TO 20220325;REEL/FRAME:059408/0016

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE